REFERENCE TO CO-PENDING APPLICATIONS FOR PATENT
None.
1. Field
The technology of the present application relates generally to customer call centers, and more particular, to apparatuses and methods to obtain confidential information at the call center without disclosing the confidential information to the customer service agent and without recording the same in a quality assurance recording.
2. Background
Many businesses use customer call centers, whether virtual (e.g. home based agents) or brick and mortar, to service their customer base. Conventionally, a customer calls into the call center and a customer service representative (CSR or an operator) answers the call. The CSR often asks a series of questions and enters the information into a graphical user interface (GUI) located at the CSR's workstation for use by the customer relationship management application(s) (CRM application(s) or sometimes just referred to as application(s)). For example, the CSR may record a complaint or a service request where the CSR asks for information to be entered into particular data fields in the CRM.
Often the CSR must request confidential, sensitive, or protected information from a customer during a session. Such information may include credit card information, social security number information, personal information, information protected by Health Insurance Portability and Accountability Act (HIPAA), other types of health information, and the like. For example, a customer may call to purchase an item or service. Conventionally, the CSR will request information regarding payment. The CSR types the information into the CRM. Recent advancements in speech to text systems, such as are available from nVoq Incorporated, allow a CSR to speak the information that is converted by a speech to text engine to data that is automatically entered into particular fields in the CRM; see, for example, U.S. Pat. No. 7,702,093, issued Apr. 20, 2010, titled Systems and Methods to Redirect. Audio Between Callers and Voice Applications, the disclosure of which is incorporated herein as if set out in full.
As can be appreciated in these systems, however, the CRM's associated GUI allows the CSR to view and potentially copy, steal, or inadvertently disclose the confidential, sensitive, or protected information. Moreover, many call centers provide audio recordings of all customer call sessions that are reviewed by the agents for quality assurance. These audio recordings, to the extent they contain confidential, sensitive, and/or protected information, are subject to potentially rigorous standards to avoid inadvertent disclosure of the information. For example, audio recordings that record credit card information in the process of providing quality assurance recordings must be maintained under the Payment Card Industry Data Security Standards, sometimes referred to as PCI compliance.
Thus, against this background, it is desirable to develop improved apparatuses and methods to secure confidential, sensitive, and/or embarrassing information from customer service representatives and associated recordings.
To attain the advantages and in accordance with the purpose of the technology of the present application, a confidential processor is provided that is configured to receive a call transfer of a customer from the customer service representative or receive an audio stream from the customer. The confidential processor receives data from the customer, via either dual tone multi-frequency input, speech to text conversion, or the like, regarding confidential information of the customer. The confidential processor, optionally, may provide a status window to the customer service representative indicating the status of the gathering of the confidential information. The confidential processor is further configured to transfer the call or audio stream back to the customer service representative and provide the confidential information for the customer relationship management application. The data entered into the customer relationship management application is obfuscated. Obfuscation may include encryption of the data or setting the password attribute on the data field. For example, using the password field attribute, the display in the graphical user interface cannot be copied to the copy buffer, which prevents the CRM from pasting the data into an unobscured area.
In certain aspects, the technology of the present application pauses a quality assurance recording on transfer of the call or the audio stream to the confidential processor and while the confidential processor is processing the confidential information. The quality assurance recording is resumed when the confidential processor transfers the call or audio stream back to the customer service representative. Alternatively to pausing the quality assurance recording, the quality assurance recording may be provided a filler signal and/or simply record silence.
In certain aspects, the technology of the present application provides status information to the customer service representative while the confidential processor is receiving information from the user. The status updates may include information such as, call connected (or audio transferred), processing information, confirming information, repeating steps, customer alerts to indicate the customer is having difficulty.
In certain aspects, the technology of the present application may transfer the customer call or audio stream to a secure agent. A secure agent may be, for example, a supervisor, a background checked agent, or the like, considered more secure than the typical agent to which the initial call may be assigned.
The foregoing and other features, utilities and advantages of the invention will be apparent from the following more particular description of a preferred embodiment of the invention as illustrated in the accompanying drawings.
The technology of the present application will now be explained with reference to
Referring first to
The call center 100 includes both voice or audio signals which lie on the signaling and audio path and terminate at the agent's phone (or headset) and data or IP-based signals that support the customer relationship management (CRM) application, whose graphical user interface (GUI) runs on the agent's processor, such as, for example, a personal computer or the like. As described above, the CRM and GUI may be hosted remotely from the workstation (thin client) or downloaded to the workstation (fat or thick client). Communication lines typically allow the transport of both audio and data signals.
Call center 100 includes devices, software modules, hardware components and wiring to support the various functions. For example, the call center 100 includes, an automatic call distribution (ACD) unit 102 having a communication connection 104 to an agent phone 106. ACD unit 102 also has a communication connection 108 to an interactive voice response (IVR) unit 110. Communication connections 104 and 108 may be overlapping, completely separate, or a combination thereof. As used herein, a communication connection, such as communication connection 104, can transmit one or more of audio and data signals over the connection. Also, while the communication connections shown herein are shown as physical connections via, for example, a cable or the like, it is possible for the communication connections to be wireless or wired. IVR 110 has a communication connection 112 to a computer telephony interface (CTI) 114. CTI 114 typically provides call control 116 to ACD 102 and data and application control 118 to an agent's computer 120. Thus, when a customer uses a telephone 122 or the like to call the call center over a conventional network 124, such as, the PSTN shown, the audio, data, and applications necessary for the agent to assist the caller are provided to the agent's workstation (including the agent's phone and/or headset).
While described as a conventional telephone call, call center 100 can receive conventional telephone calls using the Plain Old Telephone System (POTS) or using conventional cellular telephone calls. However, calls and audio should be understood to include conventional POTS and wireless telephone calls as well as the transfer of data using other networked based systems such as VoIP, audio streaming devices, and video devices such as video conferencing arrangements, SKYPE®, and the like.
Referring now to
Referring now to
As shown, caller 302 is connected to CSR 304 via an audio and data connection 308. A switch 310 is provided to CSR 304. Switch 310 may be a software switch, clickable field or a physical switch, such as a flip switch, a rotating switch, or other similar toggle. Switch 310 is adapted to transfer the caller 302 (which may include transferring the call or the audio stream) to confidential processor 312. The physical act of transferring the call or audio stream from CSR 304 to confidential processor 312 may be accomplished using any known and conventional operations that are not explained herein as they are generally well known in the art.
As is generally known, quality assurance systems 314 often record the telephone call between caller 302 and agent 304. To the extent the recording contains confidential, sensitive, or protected information (sometimes referred herein as second type information; whereas, other information may be referred to as first type information), the recording must be maintained within certain parameters. For purposes of the present application, confidential (or second type) information may include any type of information that is to be withheld. Transferring the call to the confidential processor 312 inhibits quality assurance system 314 from recording the information and may reduce the security or maintenance requirements of the quality assurance system 314. As the call has been transferred, switch 310 optionally may send a signal to quality assurance or review audio recording system 314 to pause the recording while the call is transferred to confidential processor 312. As explained below, when confidential processor 312 returns to the call, a signal to resume recording is required in the event the recording was paused. In still other aspects, the technology may allow the recording to record silence and/or provide a filler audio, such as music, into the recording while the call transferred to or audio stream is directed to the confidential processor.
Confidential processor 312 is connected to the CRM application via a data connection 316. A data configuration module 318 may be used to ensure data entered into display 306 is not readable/accessible by the CSR 304. Data configuration module 318 may be, for example, a plug-in module to cause the data field in the CRM to equate the field as a password field or otherwise encrypt the data. Data in password fields are typically not viewable nor is the data in password fields able to be copied to the copy buffer. Alternatively, the CRM application may be configured such that display 306 is preconfigured to obscure the data displayed in the CRM field. As an additional measure of security, the entire data field may be displayed with the icon, typically a bullet star *, or the like. In one example, a credit card type may be requested. Thus, to inhibit guessing the credit card type, VISA may be represented by ****************, and MasterCard similarly would be represented by ****************, and American Express similarly would be represented by **************** to inhibit someone from guessing that **** is Visa, ********** is MasterCard, and **************** is American Express.
Referring now to
Referring now to
As mentioned above, confidential processor 312 may supply data transmissions during the course of obtaining the confidential information from caller 302. Status of information may display in the GUI of the CRM or in a separate status display for obtaining the confidential information. For example, when switch 310 is activated, confidential processor 312 may transmit a signal to workstation 306 indicating that the call is being transferred, the call is connected, or the like. When the confidential processor is requesting confidential information, confidential processor 312 may transmit to workstation 306 information regarding the request, such as, for example:
Requesting the type of credit card to be used for payment;
Receiving information from the caller;
Confirming the type of credit card to be used for payment;
Requesting the credit card account number;
Receiving the credit card account number;
Confirming the credit card account number;
Requesting the credit card's security code;
Receiving the credit card's security code;
Confirming the security code;
Requesting the expiration date;
Receiving the expiration date;
Confirming the expiration date; and
etc.
Once the information is obtained, the confidential processor 312 would transmit an update to the workstation 306 that the caller is being transferred back to the agent.
If the confidential processor does not receive certain information, such as the type of credit card to be used for payment after the first query, the confidential processor may query the request to the caller again. The status update may update to provide indicia that the information is being requested again. For example, after two requests the confidential processor may transmit a trouble indicia such that the display at workstation 306 shows the status of the call in a different color, such as RED, or such that the status indicator flashes, etc. Moreover, the request may time out if no information is received. If after a predefined number of unsuccessful attempts, or after a certain amount of time with no input, the confidential processor may transfer the call back to the agent 304. Alternatively, the agent 304 may activate switch 310 at any point during the process to force the confidential processor to transfer the call back to the agent 304. Still alternatively, the confidential processor may transfer the call to a supervisor or confidential information cleared agent such that the information may be recorded in a secure fashion.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention. The above identified components and modules may be superseded by new technologies as advancements to computer technology continue.
The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The present application claims priority to U.S. Provisional patent application Ser. Number 61/357,611, titled the same, and filed on Jun. 23, 2010, which application is incorporated herein by reference as if set out in full.
Number | Date | Country | |
---|---|---|---|
61357611 | Jun 2010 | US |